Efficiency Improvements for Encrypt-to-Self

09/06/2020
by   Jeroen Pijnenburg, et al.
0

Recent work by Pijnenburg and Poettering (ESORICS'20) explores the novel cryptographic Encrypt-to-Self primitive that is dedicated to use cases of symmetric encryption where encryptor and decryptor coincide. The primitive is envisioned to be useful whenever a memory-bounded computing device is required to encrypt some data with the aim of temporarily depositing it on an untrusted storage device. While the new primitive protects the confidentiality of payloads as much as classic authenticated encryption primitives would do, it provides considerably better authenticity guarantees: Specifically, while classic solutions would completely fail in a context involving user corruptions, if an encrypt-to-self scheme is used to protect the data, all ciphertexts and messages fully remain unforgeable. To instantiate their encrypt-to-self primitive, Pijnenburg et al propose a mode of operation of the compression function of a hash function, with a carefully designed encoding function playing the central role in the serialization of the processed message and associated data. In the present work we revisit the design of this encoding function. Without questioning its adequacy for securely accomplishing the encrypt-to-self job, we improve on it from a technical/implementational perspective by proposing modifications that alleviate certain conditions that would inevitably require implementations to disrespect memory alignment restrictions imposed by the word-wise operation of modern CPUs, ultimately leading to performance penalties. Our main contributions are thus to propose an improved encoding function, to explain why it offers better performance, and to prove that it provides as much security as its predecessor. We finally report on our open-source implementation of the encrypt-to-self primitive based on the new encoding function.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/15/2023

Verifiable encodings in multigroup fully homomorphic encryption

This article presents the application of homomorphic authenticators, rep...
research
09/17/2018

Ciphertext Outdate Attacks on Xu et al.'s Revocable Attribute-Based Encryption Scheme

Cloud storage is a new computing paradigm that allows users to store the...
research
06/21/2020

An image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes

Nowadays, the chaotic cryptosystems are gaining more attention due to th...
research
12/08/2021

Building Usable Witness Encryption

Witness encryption using multilinear maps was first proposed in 2013, an...
research
09/05/2018

Multi-Client Order-Revealing Encryption

Order-revealing encryption is a useful cryptographic primitive that prov...
research
10/27/2020

2FE: Two-Factor Encryption for Cloud Storage

Encrypted cloud storage services are steadily increasing in popularity, ...

Please sign up or login with your details

Forgot password? Click here to reset